Essays about: "Computer Network Security."

Showing result 26 - 30 of 117 essays containing the words Computer Network Security..

  1. 26. Automated Gait Analysis : Using Deep Metric Learning

    University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakulteten

    Author : Isak Engström; [2021]
    Keywords : machine learning; deep learning; deep metric learning; artificial neural network; recurrent neural network; computer vision; gait; pose estimation;

    Abstract : Sectors of security, safety, and defence require methods for identifying people on the individual level. Automation of these tasks has the potential of outperforming manual labor, as well as relieving workloads. READ MORE

  2. 27. Investigation of dynamic control ML algorithms on existing and future Arm microNPU systems

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Joel Åhlund; David Cordesius; [2021]
    Keywords : Dynamic control; NPU; MTCNN; Machine learning; Neural networks; Technology and Engineering;

    Abstract : In this thesis, dynamically controlled machine learning algorithms running on state of the art Arm microNPUs, with an attached Cortex-M CPU, were investigated. The machine learning framework used was Tensorflow and different subsets of it, such as Tensorflow Lite micro. READ MORE

  3. 28. Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Robin Andersson; [2021]
    Keywords : CAN; Controller Area Network; IDS; Intrusion detection; personal vehicles; machine learning; hybrid; proof of concept; embeded systems; software architecture; malicious; security;

    Abstract : With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. READ MORE

  4. 29. Formal verification of device driver monitors in HOL 4

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tomas Möre; [2021]
    Keywords : ;

    Abstract : As computer systems become more ubiquitous in society the negative consequences of security holes and bugs in software and hardware grow larger. In theory, the optimal way to ensure that no such possibilites exists is to conduct formal proofs that the system behaves as it should and that it is incapable of performing unintended side-effects. READ MORE

  5. 30. Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Fredrik Öberg; [2021]
    Keywords : Face Recognition; Presentation Attacks; Convolutional Neural Network;

    Abstract : Biometric identification has already been applied to society today, as today’s mobile phones use fingerprints and other methods like iris and the face itself. With growth for technologies like computer vision, the Internet of Things, Artificial Intelligence, The use of face recognition as a biometric identification on ordinary doors has become increasingly common. READ MORE